The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).
                
            References
                    | Link | Resource | 
|---|---|
| https://www.securityfocus.com/bid/94356/ | Third Party Advisory VDB Entry | 
| https://www.kb.cert.org/vuls/id/346175 | Third Party Advisory US Government Resource | 
Configurations
                    Information
                Published : 2018-07-13 13:29
Updated : 2019-10-09 16:19
NVD link : CVE-2016-6565
Mitre link : CVE-2016-6565
JSON object : View
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
Products Affected
                imagely
- nextgen_gallery


